
STM8AF safety architecture
UM1915
20/43
UM1915 Rev 3
Information redundancy techniques on messages - UART_SM_2
The redundant information technique is used to protect the USART communications by
detecting both the permanent and transient faults. There are two different approaches to
implement this technique:
•
multiple sending of the same message, with comparison of the received results
•
addition by the sender of a checksum field to the message to be verified by the
receiver.
In case the checksum field approach is adopted, the selection of the algorithm for
checksum computation ensures a similar protection against message corruption as that
ensured by a full redundancy. Theoretical demonstrations on coverage capability are
admitted – the use of CRC coding is anyway suggested.
The above-reported approaches are equivalent; an additional criterion for the selection of
the approach is the availability of a quick hardware support on the MCU platform, and the
evaluation of the computation capability of the external device exchanging data with
STM8AF.
3.6.9 I2C
Periodical read-back of configuration registers - IIC_SM_0
This diagnostic measure, typically referred to as “Read back periodic by software of
configuration registers”, executes a periodical check of the configuration registers of I2C
respect to their expected value (previously stored in RAM and adequately updated after
each configuration change). It mainly addresses transient faults affecting the configuration
registers, detecting bit flips . The registers test is executed at least once per DTI.
Protocol error signals - IIC_SM_1
The I2C protocol errors signals, despite being conceived to detect physical layer related
abnormal conditions, are able to contribute to the detection of faults leading to error
messages generation such as for instance the ACK assertion phase, and related checks.
Handling such error signals at application level is a common technique in embedded
applications.
Information redundancy techniques on messages - IIC_SM_2
The redundant information technique is used to protect the I2C communications by
detecting both the permanent and transient faults. There are two different approaches to
implement this method:
•
multiple sending of the same message, with comparison of the received results
•
addition by the sender of a checksum field to the message to be verified by the
receiver.
In case the checksum field approach is adopted, the selection of the algorithm for
checksum computation ensures a similar protection against message corruption as that
ensured by a full redundancy. Theoretical demonstrations on coverage capability are
admitted – the use of CRC coding is anyway suggested (also looking for the availability of a
quick hardware support on the MCU platform).